Monthly Archives: May 2013

2 Secrets to Criminal Defense Using Cell Phone Forensics

Teachers are always encouraging school children to look for patterns – that’s because patterns are so revealing. And it’s not only true in math and science; it’s true in investigations, too.
No. 1 Secret – Patterns Tell a Story in Mobile Phone Analysis
With years of experience in the field, the investigators at International Investigators know how to cast a wide net and look at a case and situation as a whole. During a mobile phone forensic analysis, we look at records before an event or crime occurred and then after the event. Changes in patterns – habits – can be quite revealing.

Not only do the changes throw up flags, the background prior to the event or crime helps with the cell phone investigation. People who [...]

Cell Phone Forensics Might be the Best Defense

Cell phone forensics at International Investigators is more than mobile phone forensic analysis. It can include mobile phone spyware detection or cell phone hack detection and sim card forensics, but it includes many other aspects when it comes to defense in a criminal case. For instance, to provide admissible evidence to support a defendant, we employ a variety of tactics which may include:

Cell mapping using cell tower location and cell tower triangulation (to finite longitude and latitude locations)
Cell phone tracking
Ping expert analysis when evidence includes the pinging of a cell phone and testimony as a ping witness

Even when restricted or blocked calls are uncovered during a mobile phone forensics investigation, we can peel back blocked calls. Of course, to subpoena records for a blocked [...]

  • Permalink Gallery

    Suspect Embezzlement? Hire a Personal Asset Search Investigator

Suspect Embezzlement? Hire a Personal Asset Search Investigator

We have talked a lot here in the International Investigators’ blog about being asked to find hidden assets in divorce situations, but we don’t want you to think that is the only time money is hidden away from the sight of others.

Today I want to talk about another instance when we are called in to complete an asset investigation. An attorney representing a business calls when there is suspicion that an employee is embezzling money from their employer.

When suspicion is aroused in the company, one of the first calls the company management makes is to their attorney asking for advice on how to handle the situation. When we begin such an investigation we might not be finding unknown accounts or even hidden bank accounts [...]

  • Permalink Gallery

    Geography has a Role in Due Diligence Investigations and Background Checks

Geography has a Role in Due Diligence Investigations and Background Checks

We live in a time when it is not uncommon for a person to live in several states throughout their life. When International Investigators is called in on a due diligence investigation or background check, we see that trend.

If a subject has lived in a number of counties and states, that could be a major stumbling block for online search companies. Sometimes the subject has not divulged every place they have lived and that omission can result in incomplete or inaccurate information in the end.

For example, those who provide due diligence services know that there is no main comprehensive database that includes total state or national records.   There are 3,140 counties and parishes in the US.  And county records must be researched county by [...]

Cell Tower Triangulation Provides Evidence of Innocence

Another interesting case International Investigators recently investigated was centered in a child custody battle. A police officer and his wife in Iowa were divorcing and both wanted custody of their two children.

The wife accused the officer of harassing her by sending threatening text messages. He was on the verge of losing any custodial rights as well as his job when his attorney contacted us.

Proving no harassing activity on his phone was moot in this situation because it could be alleged that he was using prepaid phones, not his, for the messages.

Our team went to work. First, through cell phone forensics we were able to identify the source of the calls then we requested the records data for those phones from the service providers. At [...]

Who is Safe from a Mobile Spy?

In a recent discussion with one of the cellphone experts at International Investigators, I learned that the Blackberry is probably the least “hackable” phone out there.

A cell phone forensic analysis can include what is called a password bypass. In fact, we have been asked to uncover passwords that had been lost or forgotten. That is possible for just about any phone – except the Blackberry.

Instead of letting someone into the phone, it destroys data on the device. That explains why Blackberry is the preferred device for CEOs, political leaders (like the President), military and government agencies. Any organization that requires the most secure confidentiality opts for the brand.

Users complain about the functionality and usability, but for the security of data, Blackberry is the way [...]

  • Permalink Gallery

    Talk to a Computer Forensics Consultant to Secure Your Retired Hardware

Talk to a Computer Forensics Consultant to Secure Your Retired Hardware

So you have IT working on securing the servers and other security protocol. Maybe you should check on what happens with “broken” and replaced hardware.

You might be interested to know that a vast majority of computers and electronic equipment (even phones) that are donated to charity or sent to a recycling center still have confidential and corporate information on the drives.

Computer forensic analysis can recover data even though users think the information has been “deleted.” In fact, in many cases, after completing a computer forensics electronic discovery service, International Investigators uncovers evidence.

As a computer forensics consultant, International Investigators can work with companies and organizations to develop a security policy and procedure in regard to retired electronics. That single step in your IT security program [...]

Unfair Competitive Edge Can be Averted through TSCM Sweep

There are so many reasons for electronic surveillance. Just about any situation that includes a competitive element provides the impetus for covert surveillance. Corporate and industrial espionage may be what first comes to mind, but spy listening devices can be used in every industry and field.

According to an ESPN article from April, 2012, there were allegations that New Orleans Saints general manager Mickey Loomis had an electronic listening device installed in the Superdome that allowed him to eavesdrop on visiting coaches for nearly three NFL seasons.

Football in America is much, much more than just a game – it’s full of multi-million dollar businesses – and the competition on the field is only a small bit of the competition between the teams.

Cell phone tapping makes [...]

Know When to Catch Your Cheating Spouse

With half of all marriages in America ending in divorce, it won’t surprise you, I’m sure, to learn that in 65% of marriages, there is a cheating spouse – either currently involved in an extramarital affair or been involved in marriage infidelity in the past.

In many instances, even when you feel you have evidence to prove yourself 100% correct in your suspicions, cheating spouses may vehemently deny the allegations. If you have been together for a long time and share children and deep family ties, it’s very difficult to walk out on a whim.

Don’t agonize and worry. Don’t try to second guess what is or isn’t going on when you talk to your attorney. International Investigators has been in the business of private investigations [...]